Take a Virtual, Interactive Tour 

Blogs, Human Computer Interaction, Cyber Security, People, Places, and Things

  |  
4 Min Read

Simple Tips on Personal Cyber Security

Setting-up-Black-Hat-1.jpg

In the spirit of Black Hat/DEFCON week, I’ve decided to put together a list of important tips that users of any electronic devices should be wary of when it comes to their personal security. After all, nothing is worse than the possibility that all of your information could be stolen and used against you.

So, here is my list of cyber security tips:

  1. Always be aware of the possibility that you can be a target. It is not uncommon for users such as ourselves to say “It’ll never happen to me.” But that is a risky way of thinking. If you carelessly leave your device unprotected, someone with ill intentions could end up targeting your device, and ruining it in the process. It's better to be safe than sorry.
  2. Make and memorize strong passwords. It is unfortunate when people do not realize how important a strong password really is. If you have a weak password, odds are that someone else will figure it out immediately. So protect yourself by making strong passwords and memorizing them. If you risk writing it out, then someone else can use it, giving them unwanted access and resulting in something bad.
  3. Lock then leave. Every time you leave your device unattended, make sure to lock it. While it may seem tedious to constantly unlock it every time you return, malicious hackers only need a few seconds to corrupt your device. So please, lock then leave.
  4. What should be common knowledge but still good to mention is to never click on any unexpected or suspicious attachments or links in your email. You never know if these links will take you to bad domains and give you a virus.
  5. When it comes to anything money sensitive, such as online banking and shopping, please use your own device. Even if you are at a friend’s house, it is unwise to use your account information on any device other than your own. If your friend’s computer gets compromised, your information could be too.

Those are just a few basic tips that we should all follow, for the safety of our information and for the overall betterment of our technology. I hope they are helpful and result in successful defense against cyber attacks.

Comment

UAT Cyber Ninjas: Cyber Club and Competition Team

At University of Advancing Technology (UAT), the Cyber Ninjas competition team stands as a cornerstone of our cybersecurity community. We're more than just a club—we are a diverse group of passionate ...
Picture of Ozzy James Ozzy James 4 Min Read

TechFusion Conference: A Transformative Involvement for Students

University of Advancing Technology (UAT) Cyber Security Student Alexis Sloan attended the AZ Tech Council Event on Tuesday March 25th. She discusses the opportunities and learning experience the ...
Picture of Alexis Sloan Alexis Sloan 4 Min Read

GitHub Wants Your Policy Proposals

In light of the recent leak of Twitch’s source code (over 6,000 private GH repositories) and other information, through a 125GB data torrent over 4chan.org, GitHub (GH) is now stepping up their ...
Picture of Micah Turpin Micah Turpin 4 Min Read